CVE-2022-49373

Source
https://cve.org/CVERecord?id=CVE-2022-49373
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49373.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49373
Downstream
Related
Published
2025-02-26T02:11:14.603Z
Modified
2026-03-20T12:22:23.278479Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe
Details

In the Linux kernel, the following vulnerability has been resolved:

watchdog: ts4800wdt: Fix refcount leak in ts4800wdt_probe

ofparsephandle() returns a node pointer with refcount incremented, we should use ofnodeput() on it when done. Add missing ofnodeput() in some error paths.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49373.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bf9006399939762e6cd32445e848e56727df9d98
Fixed
5b110d940417942bc87d9e4bea6d4f24e05ed483
Fixed
910b1cdf6c50ae8fb222e46657d04fb181577017
Fixed
7a4afd8a003d6abf1f5d159c2bb67e6b7cbde253
Fixed
91fa5aa53f68b85e779164b3127c7e23cad5c457
Fixed
f067b5286edfd83d2d3903e8578b561599d62539
Fixed
5d24df3d690809952528e7a19a43d84bc5b99d44

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49373.json"